Key authentication

Results: 993



#Item
941Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
942Key-agreement protocol / Diffie–Hellman key exchange / Public-key cryptography / Key management / Perfect forward secrecy / Password authentication protocol / Man-in-the-middle attack / YAK / SILC / Cryptography / Cryptographic protocols / MQV

Overview of Key Agreement Protocols Ratna Dutta and Rana Barua Stat-Math Unit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-04 07:51:24
943Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
944Off-the-Record Messaging / Man-in-the-middle attack / Diffie–Hellman key exchange / Public-key cryptography / Public key fingerprint / Alice and Bob / Blinding / RSA / Extensible Messaging and Presence Protocol / Cryptography / Cryptographic protocols / Socialist millionaire

Improved User Authentication in Off-The-Record Messaging Chris Alexander

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2007-08-16 13:09:03
945Cryptographic protocols / Authentication / X.509 / Revocation list / Public key certificate / Certificate authority / Cryptography / Public-key cryptography / Key management

Place and Time Authentication of Cultural Assets ∗ Leonardo Mostarda, Changyu Dong, and Naranker Dulay

Add to Reading List

Source URL: www.leonardomostarda.net

Language: English - Date: 2012-08-03 17:40:53
946Internet / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / IPsec / Authentication / Internet Security Association and Key Management Protocol / X.509 / Cryptography / Cryptographic protocols / Internet protocols

LNCS[removed]Enabling Practical IPsec Authentication for the Internet

Add to Reading List

Source URL: netcom.it.uc3m.es

Language: English - Date: 2009-07-22 08:04:32
947Public key certificate / Authorization certificate / X.509 / Certificate authority / Digital signature / X.500 / Authentication / Revocation list / Lightweight Directory Access Protocol / Cryptography / Public-key cryptography / Key management

Commercialization of Digital Signatures Frank Sudia Bankers Trust

Add to Reading List

Source URL: www.fwsudia.com

Language: English - Date: 2000-10-16 16:36:14
948Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
949Pennsylvania Avenue / Message authentication codes / Foggy Bottom / Ballston–MU / Farragut West / One-key MAC / Washington Metro / Orange Line / Silver Line

Effective[removed]How to use this timetable

Add to Reading List

Source URL: wmata.com

Language: English - Date: 2013-03-20 11:39:45
950Public-key cryptography / Access control / ISO standards / Ubiquitous computing / Smart card / Authentication protocol / Public key infrastructure / Subscriber identity module / Password authentication protocol / Cryptography / Security / Cryptographic protocols

LNCS[removed]Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2010-04-12 17:49:56
UPDATE